Mounir IDRASSI
|
3281b276b6
|
Windows: Fix various warnings
|
2021-01-02 01:16:40 +01:00 |
|
Mounir IDRASSI
|
9881744c95
|
Windows: Add support for ARM64 platform (e.g. Microsoft Surface Pro X). System encryption still not implemented on ARM64
|
2021-01-02 01:16:31 +01:00 |
|
Mounir IDRASSI
|
1157971784
|
Windows: Update signed drivers to version 1.24.24
|
2020-12-13 01:00:47 +01:00 |
|
Mounir IDRASSI
|
21674c6aec
|
Windows: Fix various compiler warnings
|
2020-12-11 23:42:14 +01:00 |
|
Mounir IDRASSI
|
b48d437c80
|
Windows Driver: Fix build error using Windows 10 WDK caused by name conflict for KeSaveExtendedProcessorState/KeRestoreExtendedProcessorState functions
|
2020-12-11 23:42:08 +01:00 |
|
Mounir IDRASSI
|
699a0a3ca5
|
Increment internal version to 1.24.20 and update release notes
|
2020-07-22 17:28:06 +02:00 |
|
Mounir IDRASSI
|
7a87141e53
|
Increment internal version to 1.24.19
|
2020-07-04 00:46:44 +02:00 |
|
Mounir IDRASSI
|
3f587a3629
|
Windows: Don't use API for Processor Groups support if there is only 1 CPU group in the system. This can fix slowness issue observed on some PCs with AMD CPUs.
|
2020-07-02 02:20:42 +02:00 |
|
Mounir IDRASSI
|
23d64ab195
|
Increment internal version to 1.24.18 and update signed Windows drivers.
|
2020-06-29 01:00:02 +02:00 |
|
Mounir IDRASSI
|
b270a453aa
|
Windows: remove unused code targeting Windows 2000.
|
2020-06-28 01:06:14 +02:00 |
|
Mounir IDRASSI
|
7cb9b8dfc9
|
Windows: Update signed driver to version 1.24.17
|
2020-06-26 19:13:37 +02:00 |
|
Mounir IDRASSI
|
cb1efdc9ae
|
Increment version to 1.24-Update7
|
2020-06-23 16:48:54 +02:00 |
|
Mounir IDRASSI
|
bec929ce03
|
Windows Driver: Use real disk sector size instead of generic 512 bytes value when probing disk real size
|
2020-06-21 17:42:08 +02:00 |
|
Mounir IDRASSI
|
0121dc0b81
|
Windows: Fix issue when RAM encryption used, AES selected and AES-NI not supported by CPU that caused the free space of newly created volumes not filled with random data even if "quick format" is not selected by user.
|
2020-06-21 00:27:15 +02:00 |
|
Christopher Bergqvist
|
0a2c565aa9
|
Switch from auto_ptr to unique_ptr (#638)
|
2020-06-11 18:02:28 +02:00 |
|
Mounir IDRASSI
|
0127927b73
|
Windows: Update signed Windows driver to version 1.24.15
|
2020-03-11 14:01:41 +01:00 |
|
Mounir IDRASSI
|
8fa1596e73
|
Increment version to 1.24-Update5 and update signed Windows drivers.
|
2020-02-11 23:05:48 +01:00 |
|
Mounir IDRASSI
|
94d3a1919c
|
Windows: Implement support for processor groups in the driver and fix build issues caused by previous implementation
|
2020-02-10 02:23:25 +01:00 |
|
Mounir IDRASSI
|
ed8068cbbd
|
Increment version to 1.24-Update2
|
2019-12-10 11:10:24 +01:00 |
|
Mounir IDRASSI
|
5eaa204d83
|
Windows Driver: Reduce memory usage of IOCTL_DISK_VERIFY handler. Now we reader disk by chunks of at most 64 KiB. Fix https://github.com/veracrypt/VeraCrypt/issues/562.
|
2019-12-09 18:59:27 +01:00 |
|
Mounir IDRASSI
|
5e96a5c44c
|
Windows: enhancements to the mechanism preserving file timestamps, especially for keyfiles.
|
2019-12-08 23:42:47 +01:00 |
|
Mounir IDRASSI
|
c035d703cb
|
Windows: Update signed drivers
|
2019-11-07 00:48:16 +01:00 |
|
Mounir IDRASSI
|
b7a21b8a76
|
Windows Driver: Fix strange crashes caused by probably by APC queue issues from calls to IoBuildDeviceIoControlRequest and ZwCreate (cf https://www.osr.com/blog/2018/02/14/beware-iobuilddeviceiocontrolrequest/)
|
2019-11-07 00:48:09 +01:00 |
|
Mounir IDRASSI
|
4587472e87
|
Increment version to 1.24-Hotfix2
|
2019-11-07 00:48:01 +01:00 |
|
Mounir IDRASSI
|
fa3d4c79c9
|
Increment version to 1.24-Beta6
|
2019-10-02 11:40:08 +02:00 |
|
Mounir IDRASSI
|
3923d11c7b
|
Windows Driver: Disable Hibernation when RAM encryption is enabled since we can't resume from Hibernation without RAM encryption keys (a chicken and egg situation)
|
2019-10-01 15:09:35 +02:00 |
|
Mounir IDRASSI
|
69df92c81d
|
Increment version to 1.24-Beta5
|
2019-03-09 08:04:04 +01:00 |
|
Mounir IDRASSI
|
1bd3a6cc70
|
Windows Driver: fix BSOD when mounting outer volume with hidden volume protection if RAM encryption is enabled
|
2019-03-09 08:03:57 +01:00 |
|
Mounir IDRASSI
|
d6ce1db2a8
|
Increment version to 1.24-Beta4 and update release notes to clarify that password length increase applies only to non-system volumes.
|
2019-03-09 08:03:51 +01:00 |
|
Mounir IDRASSI
|
f780011a86
|
Windows Driver: fix BSOD when mounting hidden volume if RAM encryption is enabled
|
2019-03-08 01:02:57 +01:00 |
|
Mounir IDRASSI
|
5c934d8122
|
Windows Driver: Add IOCTL code to query RAM encryption status in VeraCrypt driver
|
2019-03-03 23:48:49 +01:00 |
|
Mounir IDRASSI
|
8e39877054
|
Increment version to 1.24-Beta3. Update Release Notes.
|
2019-03-03 23:48:28 +01:00 |
|
Mounir IDRASSI
|
edd1b00126
|
Windows Driver: Enable RAM encryption only after its security parameters were created
|
2019-03-01 00:35:54 +01:00 |
|
Mounir IDRASSI
|
ae5eb73f93
|
Windows driver: call VcProtectKeys only when RAM encryption enabled although this function does nothing when RAM encryption is disabled.
|
2019-03-01 00:35:33 +01:00 |
|
Mounir IDRASSI
|
8d7a318795
|
Windows: use specific order for EFI boot arguments memory regions that matches the one used by EFI bootloader.
|
2019-03-01 00:35:20 +01:00 |
|
Mounir IDRASSI
|
cf48b532b4
|
Windows: Implement RAM encryption for keys on 64-bit machines using ChaCha12 cipher and t1ha non-cryptographic fast hash (https://github.com/leo-yuriev/t1ha)
|
2019-03-01 00:35:13 +01:00 |
|
Mounir IDRASSI
|
86f0fde6e7
|
Windows: Use Hardware RNG based on CPU timing jitter "Jitterentropy" by Stephan Mueller as a good alternative to RDRAND (http://www.chronox.de/jent.html, smueller@chronox.de)
|
2019-02-12 19:06:14 +01:00 |
|
Mounir IDRASSI
|
ba5da0946c
|
Windows: Add implementation of ChaCha20 based random generator. Use it for driver need of random bytes (currently only wipe bytes but more to come later).
|
2019-02-08 01:50:12 +01:00 |
|
Mounir IDRASSI
|
e5b9cee868
|
Windows: Add option to enable use of CPU RDRAND/RDSEED as source of entropy which is now disabled by default
|
2019-02-08 01:50:03 +01:00 |
|
Mounir IDRASSI
|
5d3278bcf2
|
Update Release Notes and other files for 1.24-Beta2 release
|
2019-02-01 13:02:01 +01:00 |
|
Mounir IDRASSI
|
5571a8ba6b
|
Windows driver: better randomness for wipe bytes by always using Whirlpool hash of current time and random bytes retrieved using CPU RDRAND/RDSEED if available.
|
2019-02-01 00:36:19 +01:00 |
|
Mounir IDRASSI
|
b294cc2e1c
|
Increment version to 1.24-Beta2
|
2019-01-28 17:16:41 +01:00 |
|
Mounir IDRASSI
|
cdd1179c63
|
Increase password maximum length to 128 bytes from 64 bytes
|
2019-01-28 17:16:33 +01:00 |
|
Mounir IDRASSI
|
54e46c260c
|
Windows Driver: force the input size for some IOCTLs to have a fixed value
|
2019-01-28 17:16:23 +01:00 |
|
Mounir IDRASSI
|
a20b3083b0
|
Windows: Add a build configuration containing EFI bootloader signed with custom SecureBoot key instead
|
2019-01-26 01:20:51 +01:00 |
|
Mounir IDRASSI
|
d73b8bdf74
|
Windows: Increment driver version to 1.24.1.1
|
2019-01-22 09:53:32 +01:00 |
|
Mounir IDRASSI
|
ee0a2659da
|
Windows driver: remove volumes master keys from CRYPTO_INFO since they are not needed after their key schedule is created
|
2019-01-21 00:45:31 +01:00 |
|
Mounir IDRASSI
|
27b3fee02d
|
Windows: remove unused fields from CRYPTO_INFO structure
|
2019-01-21 00:45:23 +01:00 |
|
Mounir IDRASSI
|
d3e7ed96f3
|
Windows: Implement feature that enables clearing of encryption keys when a new device is inserted. Better implementation for update of EFI bootloader without usage of drive letters (this can fix random issues encountered during Windows upgrade).
|
2019-01-14 10:49:05 +01:00 |
|
Mounir IDRASSI
|
406adce424
|
Increment version to 1.24-Beta1
|
2019-01-14 10:48:41 +01:00 |
|